Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

EFF: AT&T forwards all Internet traffic into NSA
www.spamdailynews.com ^ | April 07, 2006 | spamdailynews

Posted on 04/07/2006 6:57:10 PM PDT by Bobalu

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-103 next last
To: Bobalu

AT&T = Always Tattling and Tattling?


41 posted on 04/07/2006 8:52:29 PM PDT by The Red Zone
[ Post Reply | Private Reply | To 1 | View Replies]

To: Squantos

Did you write that?


42 posted on 04/07/2006 8:53:09 PM PDT by Dashing Dasher (TIM--MAY wants to be an IPW too!)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Dashing Dasher

What are you some kind fo NSA spy errr something ?

My homepage has it if ya need it !

Feel free to use as ya see fit ........:o)


43 posted on 04/07/2006 8:55:09 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet. ©)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Squantos
I've already shamelessly stolen yours.

Don't worry, I gave you full credit. Those royalty checks should start rolling in any day now buddy.

L

44 posted on 04/07/2006 8:58:08 PM PDT by Lurker (In God I trust. Everyone else shows me their hands.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Squantos

I couldn't imagine you actually typing all of that.

Fat finger disease?

;-)


45 posted on 04/07/2006 8:58:38 PM PDT by Dashing Dasher (TIM--MAY wants to be an IPW too!)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Eastbound

"I think we drove them nuts posting every know word in the list."

Nope...I'm sure that a list of several of the keywords or phrases gets instantly culled out as an obvious attempt at taunting the system.

The list above will never be tagged for scrutiny by an actual flesh and blood agent.

To play this game add just one word from the list to an ordinary text like an email....but be aware that such a stunt WILL get you noticed...best not play this game.

To really get attention add the word to data sent via the TOR anonymous router system.... TOR is not totally secure but the snoops will get really curious if you post keywords there.

Foreign governments regularly run operations where data is highly encrypted and then placed on the net as a questionable communication...if the US takes action based on the phony data they know the cipher has been compromised. This is how various actors or governments know what level of encryption is safe to use.


46 posted on 04/07/2006 9:01:58 PM PDT by Bobalu (This is not the tag line you are looking for.....move along (waves hand))
[ Post Reply | Private Reply | To 32 | View Replies]

To: Dashing Dasher

Um.... I talk-type with a voice program DD !

Albeit I do have opposing thumbs !


47 posted on 04/07/2006 9:03:05 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet. ©)
[ Post Reply | Private Reply | To 45 | View Replies]

To: Squantos
Like these?

Good morning!

48 posted on 04/07/2006 9:06:07 PM PDT by Dashing Dasher (TIM--MAY wants to be an IPW too!)
[ Post Reply | Private Reply | To 47 | View Replies]

To: SubGeniusX
If you're not doing anything wrong you have nothing to worry about ..... and therefore, people who could only get government jobs can snoop about and do anything they feel like doing, Constitution be damned.

No charge for the completion!

49 posted on 04/07/2006 9:07:51 PM PDT by Hank Rearden (Never allow anyone who could only get a government "job" attempt to tell you how to run your life.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Dashing Dasher

We'll yeah they are OK but I like em bigger with just a nipple on each one......:o)


50 posted on 04/07/2006 9:11:57 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet. ©)
[ Post Reply | Private Reply | To 48 | View Replies]

To: SubGeniusX

TATP, pbuh, New York, Washington D.C, glory, agent, Hamburg, Sarajevo, holy, infidels, visa,...

illegals, border

Just put those last two words in there to spare you the visit.


51 posted on 04/07/2006 9:28:32 PM PDT by thoughtomator (A nation that cannot or will not control its borders is not a nation at all)
[ Post Reply | Private Reply | To 21 | View Replies]

To: SubGeniusX; Babalu; Squantos
Thanks for the info.
52 posted on 04/07/2006 9:32:13 PM PDT by Eastbound
[ Post Reply | Private Reply | To 36 | View Replies]

To: Bobalu

Can you here me now?


53 posted on 04/07/2006 9:34:04 PM PDT by Redleg1963
[ Post Reply | Private Reply | To 1 | View Replies]

To: Syntyr

LOL! What an awesome thread!


54 posted on 04/07/2006 9:52:37 PM PDT by Triggerhippie (Plus ça change, plus c'est la même chose.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: thoughtomator

Actually it depends on how they interpert it ... "illegals, border" might not be taken well with "Backpack, Al Franken, dirtybomb"


55 posted on 04/07/2006 10:14:33 PM PDT by SubGeniusX
[ Post Reply | Private Reply | To 51 | View Replies]

To: Bobalu
A lot of folks here on Free Republic are supportive of the government's wholesale survellance of the citizens of this country, but I'm not one of them.

If you give FedGov an inch, they'll take a mile. International calls, telegrams, faxes and whatnot have been routinely monitored for ages (See the book "Puzzle Palace"). This shift to a total survellance society will not enhance the freedom of our children one bit. They may well curse us for sitting on the sidelines while their future liberty was traded for the false illusion of security.
 

56 posted on 04/07/2006 10:26:03 PM PDT by zeugma (Anybody who says XP is more secure than OS X or Linux has been licking toads.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu; Eastbound; calljack

OMG ...

Lookie what I found ...

New Toy!!

This is Fantastic ...

Echelon's Trigger Words Generator:
http://www.bugbrother.com/echelon/spookwordsgenerator.html

Click on the button in order to generate a randomized text
made of the 'trigger words' supposed to activate Echelon.

Simon Davies, director of Privacy International, warns that the list of 1,700 suspicious "trigger words" will not outsmart the global surveillance system : "The Echelon system works on a very sophisticated system of word relationships, rather than strictly on keywords. Powerful artificial intelligence software is used to judge the relationship between words, and analyse strings of words." Davies advises sending a whole series of original keyword transmissions through email, rather than relying on someone else's template."

Sample:

From: president@whitehouse.gov
To: foia@hq.nasa.gov
Subj: BENKOLI SERRI (TOP SECRET - Iran)

Nikolai Patrushev, head of Federal'naya Sluzhba Bezopasnosti (FSB), told Korean Central Intelligence Agency (KCIA) about Djibouti frenchelon station : a most wanted person sent TsSR (NIS Tsienntral'naya Sloujba Razviedki)`s encryption products & snake oil backdoors to Mujahedin-e Khalq Organization (MEK or MKO) !

Ask 21st Space Wing`s contact of Wal-Mart Stores money laundering Dpt via http://www.asio.gov.au/ for Ref. COCOT, NACSINSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA.

------

why do I do these things? This can only lead to trouble ;-)


57 posted on 04/07/2006 10:29:09 PM PDT by SubGeniusX
[ Post Reply | Private Reply | To 46 | View Replies]

To: jpl
The magic words are squeamish ossifrage.

If more folks routinely used encryption, it would make programs like the one mentioned in the article less useful for them.

58 posted on 04/07/2006 10:32:47 PM PDT by zeugma (Anybody who says XP is more secure than OS X or Linux has been licking toads.)
[ Post Reply | Private Reply | To 28 | View Replies]

To: Bobalu
Nope...I'm sure that a list of several of the keywords or phrases gets instantly culled out as an obvious attempt at taunting the system. The list above will never be tagged for scrutiny by an actual flesh and blood agent.

O.K.  From now on, all my seditious email will contain a list of keywords that large, thus ensuring that it won't be scrutinized.

A lot of the issues that surround the posting of these types of lists has been pretty thoroughly discussed on the Cypherpunk mailing list amonst other places. Many folks who study and occasionally work with spooks would tell you that it's not so much content as traffic analysis (who is talking to who) that is checked for on a routine basis. Combine some sophisticated traffic analysis with some keyword sifting, and you can sift out an incredible amount from the garbage you're not interested in. I'd love to see some of the analysis tools that the NSA and similar agencies have come up with. I'll bet there are some interesting stories there.

59 posted on 04/07/2006 10:42:55 PM PDT by zeugma (Anybody who says XP is more secure than OS X or Linux has been licking toads.)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Bobalu
I am an SBC retiree from 5 years ago. We were in the process of switching everything to digital and optical as fast as possible before I retired. The reason was for the government more than for our own benefit. For sure, we benefited, but my impression was it was to gain favor with Washington. This was after the Waco and OK City disasters and the government( more than just Reno and Clinton), was interested in domestic spying. When trunking went on fiber, it could go anywhere in the world to be monitored for repair purposes. One scenario was to send it to Mexico to outsource the repair center jobs. It could just as easily have been India or China.

The kicker was one set of trunks would go to the East coast( Maryland or Virginia). Probably West Virginia to get Byrd's vote. They would listen in on what ever they pleased without our knowledge. That's how Echelon started. All they need is a fiber leg off the main fiber ring and dial in whatever digital address you have to monitor every stream if info on the fiber. If someone says "bomb", they can trace it in milliseconds.

Digital service has many commercial advantages, but it was pushed so hard ( some went bankrupt trying to keep up) so the government could just dial in on whatever circuit they want to monitor. This is not news. It was big on FR then. It went on through anyway. Trying to put this on Bush is just crazy. Even Republicans voted for it under Clinton to stop domestic terror. They have machines that monitor everything and kick out the key words and phrases that have been mentioned. Then a human decides whether or not to follow up.

If you call in trouble on your line, the person you get could check your line in Texas, St. Louis, or Bombay. The same goes for the Feds. Now they have your digital cell phone( remember the push to get new digital phones?) with GPS in them. They know where you are within 3 feet. When and if we go wireless, it will be the same thing. 1984 is here and has been here for a decade or more. Lets not have ant "hate" speech, shall we!

60 posted on 04/07/2006 10:56:29 PM PDT by chuckles
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-103 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson